Você está na página 1de 14

International Journal of Computer Science Engineering

and Information Technology Research (IJCSEITR)


ISSN(P): 2249-6831; ISSN(E): 2249-7943
Vol. 7, Issue 3, Jun 2017, 19-32
TJPRC Pvt. Ltd.

DATA MINING ANALYSIS FOR NATIONAL SECURITY

R. E. OKONIGENE1, M. J. E. EVBOGHAI2 & GUIAWA MATHURINE3


1
Professor, Department of Electrical & Electronics Engineering, Ambrose Alli University, Ekpoma, Edo State, Nigeria
2
Department of Electrical & Electronics Engineering, Ambrose Alli University, Ekpoma, Edo State, Nigeria
3
Department of Electrical/Electronic Engineering, Faculty of Engineering and
Technology Ambrose-Alli University, Ekpoma Edo State, Nigeria
ABSTRACT

This work takes a view on different data mining and geospatial modeling analysis in the identification process
study. The structure and working principle are reviewed alongside recent development in Biometric process. Data mining
is a technique that enables registration of citizen from childbirth to the age of 18 upward, while keeping tract with the
physical appearance of the child plus his historical background. A database comprises of densely interconnected
computer processors working simultaneously (in parallel). A key feature of neural networks is that they are programmed
to 'learn' by sifting data repeatedly, looking for relationships to build mathematical models, and automatically correcting
these models to refine them continuously.

Original Article
KEYWORDS: Computer, Processor, Feature, Data, Relationships, Mathematical Models, Automatically & Models

Received: Jan 31, 2017; Accepted: Feb 25, 2017; Published: May 19, 2017; Paper Id.: IJCSEITRJUN20173

INTRODUCTION

The importance of information for the effective functioning of any enterprise has been a central concern
of economic theory for some time. A large body of literature has emerged in an effort to explain how asymmetric
and costly information search could explicate equilibrium price dispersion for homogeneous goods [7]. Access to
telecommunication for example, has been cited as a factor for social economic development, especially in rural
areas (Samuel et al., 2005).

Telecommunications can involve any wired or wireless technologies that allow people and businesses to
communicate with each other. Computer networks are only a part of what we learn about; this area of study also
covers the security issues and business needs commonly associated with telecommunications. [8]

Mandatory nationwide identification systems have been implemented in a number of countries, including
Argentina, Belgium, Colombia, Germany, Italy, Peru, and Spain. While these schemes vary by country, individuals
are typically assigned an ID number, which is used for a broad range of identification purposes. Large amounts of
personal data such as name, birth date, place of birth, gender, eye color, height, current address, photograph, and
other information is linked to this ID number and stored in a centralized database. In many countries, such as
Argentina, national ID regimes are adopted during military or authoritarian regimes.

National ID cards and the databases behind them comprise the cornerstone of government surveillance
systems that creates risks to privacy and anonymity. The requirement to produce identity cards on demand
habituates citizens into participating in their own surveillance and social control.

www.tjprc.org editor@tjprc.org
20 R. E. Okonigene, M. J. E. Evboghai & Guiawa Mathurine

METHODS
Area / Location of the Study

Edo State Police Command Headquarter is situated on Adesuwa Grammar School Road, Benin City, Edo State,
Nigeria. Geographically, the coordinates of Benin City may think of having a latitude of 62017 N, a Longitude of
53732 E and an Elevation above sea level of 88 m = 288 ft.

The rate of crime occurrence on a monthly basis was obtained for a period of six years (2010 to 2015) from major
crimes and local acts returns for the Edo State Police Command Headquarter inside State CID.

The major crime cases reported are namely; Murder, Arm/Robbery, Attempt/Murder, Gravious Harm/Wounding,
Assault, Stealing, Rape and indecent Assault, Kidnapping, Cultism, Burglary, House Braking, Store Braking, False
Pretence/Cheating, Forgery, Receiving stolen property, Unlawful possession, Arson, Breach of public peace, offences
against fire arms act, snatched of vehicles, car theft, vandalization, other offences, S.U.D., offences against traffic act,
malicious damage, threatening violence, communal clash, political violence, suicide.

RESULTS

Table 1: Major Crimes and Local Acts Returns for the Edo State Police
Command Head Quarter: 2010(January-December)

Impact Factor (JCC):8.8765 NAAS Rating: 3.76


Data Mining Analysis for National Security 21

Figure 1(a): Frequency of Occurrence

Table 2: Major Crimes and Local Acts Returns for the Edo State
Police Command Headquarter 2010(January-December)

Figure 1(b): Frequency of Occurrence

www.tjprc.org editor@tjprc.org
22 R. E. Okonigene, M. J. E. Evboghai & Guiawa Mathurine

Table 3: Major Crimes and Local Acts Returns for the Edo State
Police Command Headquarter 2011(January-December)

Figure 2(a): Frequency of Occurrence

Impact Factor (JCC):8.8765 NAAS Rating: 3.76


Data Mining Analysis for National Security 23

Table 4: Major Crimes and Local Acts Returns for the Edo State
Police Command Headquarter 2011(January-December)

Figure 2(b): Frequency of Occurrence

www.tjprc.org editor@tjprc.org
24 R. E. Okonigene, M. J. E. Evboghai & Guiawa Mathurine

Table 5: Major Crimes and Local Acts Returns for the Edo State Police
Command Head Quarter: 2012(January-December)

Figure 3(a): Frequency of Occurrence

Table 6: Major Crimes and Local Acts Returns for the Edo State Police
Command Head Quarter: 2012(January-December)

Impact Factor (JCC):8.8765 NAAS Rating: 3.76


Data Mining Analysis for National Security 25

Figure 3(b): Frequency of Occurrence

Table 7: Major Crimes and Local Acts Returns for the Edo State Police
Command Head Quarter: 2013(January-December)

Figure 4(a): Frequency of Occurrence

www.tjprc.org editor@tjprc.org
26 R. E. Okonigene, M. J. E. Evboghai & Guiawa Mathurine

Table 8: Major Crimes and Local Acts Returns for the Edo State Police
Command Head Quarter: 2013(January-December)

Figure 4(b): Frequency of Occurrence

Table 9: Major Crimes and Local Acts Returns for the Edo State Police
Command Head Quarter: 2014(January-December)

Impact Factor (JCC):8.8765 NAAS Rating: 3.76


Data Mining Analysis for National Security 27

Figure 5(a): Frequency of Occurrence

Table 10: Major Crimes and Local Acts Returns for the Edo State Police
Command Head Quarter: 2010(January-December)

Figure 5(b): Frequency of Occurrence

www.tjprc.org editor@tjprc.org
28 R. E. Okonigene, M. J. E. Evboghai & Guiawa Mathurine

Table 11: Major Crimes and Local Acts Returns for the Edo State Police
Command Head Quarter: 2015(January-December)

Figure 6(a): Frequency of Occurrence

Table 12: Major Crimes and Local Acts Returns for the Edo State Police
Command Head Quarter: 2015(January-December)

Impact Factor (JCC):8.8765 NAAS Rating: 3.76


Data Mining Analysis for National Security 29

Figure 6(b): Frequency of Occurrence

DISCUSSIONS OF RESULTS

The following shows the analysis of crime rate, as it occurs over a period of six years (2010 to 2015). In the Edo
State police headquarters inside state CID.

Tables 1 to 12 above shows the number of offenses recorded in from 2010 to 2015 ranging from Murder to
Suicide.

Offense Related With Stealing

The figures above 2a, 3a and 4a showed that there was no case of stealing in the years 211,212 and 2013; it was
less significant in the year 2010 figure 1a, significant in the year 2015 figure 6a, and dominant in the year 2014 figure 5a. It
may also be observed in the case of burglary that it occurred at a constant rate all through the years 2010,2011,2012,2013
and 2015 figures 1a, 2a, 3a, 4a, and 6a; it was a bit dominant in the year 2014 figure 5a. The case of house braking
occurred in the approximated rate in the years 2011, 2012 and 2015, figures 2a, 3a and 6a dominant in the years 2010,
2014, and 2015 figures 1a, 5a and 6a. The case of store breaking occurred at a constant rate through the years 2010 to
2012, 2015 figures 1a, 3a, and 6a. It was dominant in the years 2013 and 2014 figures 4a and 5a. Car theft did not occur in
the years 2014 and 2015figures 5a and 6a but was dominant through the years 2010 to 2013 ranging from 200 to 250
figures 1a and 3a. An arm / robbery occurs almost at a constant rate throughout the years 2010, 2014 and 2015 figures
1a,5a and 6a, appear dominant through the years 2011 to 2013figures 2a and 4a.

Offense Related With Murder

Figures 4a and 6a, above showed that there was the case of suicide was insignificant in the years 2013 to 2015,
significant in the year 2012 figure 3a. Attempt/murder was less significant in the years 2012 and 2014 figures 3a and 5a,
significant in the years 2010, 2014 figures 1a and 5a; it was dominant in the years 2013 and 2015 figures 4a and 6a. A
murder occurred significantly all through the years 2010 to 2015figures 1a and 6a; the frequency of occurrence is
approximately (75) in 2010, 2013; (105) in 2011, 2012 and 2015, but dominant (145) in 2014. Kidnapping is also
significant all through the years 2010 to 2015, but the frequency of occurrence varies approximately from (50) in the years
2014, 2015; (75) in the years 2010 and 2013 (105) in the year 2011 to (130) in the year 2012.

www.tjprc.org editor@tjprc.org
30 R. E. Okonigene, M. J. E. Evboghai & Guiawa Mathurine

Offense Related With Violence

Figures 2a and 3a above showed that threatening of violence did not occur in the years 2011, 2012; it was
insignificant in the year 2010 signed in the year 2014 and dominant in the year 2015. Political violence did not occur in the
years 2013, 2015; then it was insignificant with the frequency of occurrence of about (20) through the years 2010, 2011,
2012 and 2014. Communal clash did not occur in the years 2013, 2015; then it was insignificant with the frequency of
occurrence of about (20) through the years 2010, 2011, 2012 and 2014. Vandalization did not occur all through the years
2011 to 2015 and it appears significantly in the year 2010. Malicious damage did not occur in the years 2015; appear
insignificant in the years 2010, 2011, 2012, signed in the year 2013 and dominant in the year 2014.

Offense related with Societal Instability

Figures 1a to 6a above showed that cultism did not occur all through the years 2011 to 2014, but it was
insignificant in the year 2010 and a bit dominant in the year 2015. Offenses against the firearm act did not occur all
through the years 2011 to 2014, but it was insignificant in the year 2010 and a bit dominant in the year 2015. Rape and
indecent assault occurred all through the years 2010 to 2015 with the frequency of occurrence varying approximately from
(50) in the year 2015; (70) in the years 2011, 2012; (75) in the year 2015; (205) in the year 2013 to (300) in the year 2014.
Breach of public peace occurred all through the years 2010 to 2015 with the frequency of occurrence varying
approximately from (50) in the year 2015; (105) in the years 2012, 2013; (205) in the years 2010, 2011 to (400) in the year
2014. The assault occurred all through the years 2010 to 2015 with the frequency of occurrence varying approximately
from (300) in the year 2012, (350) in the years 2011, 213, 2015; (450) in the year 2010 to (550) in the year 2014.

Offense related with Societal Cheating

Figures 2a to 6a, above shows that S.U.D did not occur all through the years 2011 to 2014, it was insignificant in
the year 2010 and a little bit significant in the year 2015. An offense against traffic act did not occur all through the years
2011 to 2014; it was insignificant in the year 2010 and a little bit significant in the year 2015. The case of forgery did not
occur in the year 2013; it was insignificant in the year 2014, a little bit significant in the year 2011, more significant in the
year 2010, 2015 and a bit dominant in the year 2012. The case of receiving stolen property occurred all through the years
(2010 to 2015) with the frequency of occurrence ranging approximately from (20) in the year 2010, (25) in the years
2011,2012; (50) in the years 2013, 2014 to (52) in the year 2015. Arson offenses occurred all through the years (2010 to
2015) with the frequency of occurrence ranging approximately from (25) in the year 2015, (35) in the year 2013, (40) in
the years 2010,2011,2013 to (45) in the year 2014. Unlawful possession offenses occurred all through the years (2010 to
2015) with the frequency of occurrence ranging approximately from (20) in the year 2011, (30) in the year 2012, (45) in
the years 2010, 2014, (90) in the years 2013,2015. Other offenses did not occur in the years 2013, 2014; it was significant
in the years 2012, 2015, dominant in the years 2010, 2011 with the frequency of occurrence of about 140. False pretense /
cheating occurred dominantly all through the years with the frequency of occurrence ranging approximately from (100) in
the year 2014, (105) in the year 2012, (1340) in the years 2011, 2013 to (148) in the years 2010 to 2015.

Figure 1b to 6b above showed the number of cases reported from 2010 to 2015 on yearly plot.

Figure 3b and 6b showed that the year 2012 and 2015 witness the lowest number of cases reported.

Figure 1b, 2b and 4b showed that there were 1500 to 2000 cases reported in the year 2010, 2011 and 2013.

Impact Factor (JCC):8.8765 NAAS Rating: 3.76


Data Mining Analysis for National Security 31

Figure 5b showed that 2014 recorded the highest cases reported under the period review.

Also, it would be observed as shown by the figures 1 to 6 that, there were no cases recorded in the area of
snatching of vehicles and vandalization in the year 2010 to 2015.

It was documented that there few cases of offenses recorded in the area of attempt to murder, cultism, forgery,
receiving of stolen property, unlawful possession of arms, arson, offenses against fire arm, S.U.D, offenses against traffic
act, communal clash, political violence and suicide in the period of 2010 to 2015.

However, there were several cases recorded by the security authorities in the area of murder, arm robbery, rape
and indecent assault, kidnapping, burglary, housebreaking, store breaking, other offenses, malicious damage and
threatening violence in the period of 2010 to 2015.

It would also be documented that there were increasing cases in the area of grievous harm, assault offenses,
stealing, false pretense/cheating, breach of the public peace and car theft in the year, 2010 to 2015.

It should be suggested that the security agencies should persecute those involve in the area of grievous harm,
assault offenses, stealing, false pretense/cheating and car theft in the society.

Figure 1.0: Block Diagram of the Direct Access Storage Model System
Source: field of authors

www.tjprc.org editor@tjprc.org
32 R. E. Okonigene, M. J. E. Evboghai & Guiawa Mathurine

For the purpose of the project, a domain may be registered to host the application and create other sub domains for
the key sectors, to illustrate, how the data gathered will be sent across to other domains and used by the different sectors?

CONCLUSIONS

From the above analysis, it is found that even after prosecution, some of the bailed offenders continue with the
same activities, without being properly traced. The security agents rely solely on the public willingness and information to
track down the wanted offenders at large, as stated by the Edo State commissioner of police, Sir Foluso Adebanjo, during
the Ebs TV program Crime Watch show I quote Remember, the police need your informations to help you. At the
moment, such offense occurred if the data warehouse is being connected to the direct access storage, whether at large or
not, all offenders bioinformation, finger print, passport photograph etc. will be known, a situation that can make
investigation easy.

REFERENCES

1. Biometrics for Nigeria retrieved from www.aware.com/ Software Products Fingerprint, Face, Iris. On the 2013-06-10.

2. Biometric www.m2sys.com/Biometric-SDK, Fingerprint, Finger/Palm Vein & Iris; 1Server, No SDK. On the 2010-06-10.

3. "Biometrics (2007). Overview "retrieved from Biometrics.cse. msu. edu. on the 2012-06-10.

4. Bill Flook ( 2013). "This is the 'biometric war' Michael Saylor was talking about". Washington Business Journal; 3:56

5. "Biometrics for Secure Authentication". Retrieved from www.m2sys.com/Biometric-DK on the 2012-(2009).

6. "Characteristics of biometrics of biometric". Cernet.

7. Esselaar, P.;O. Hesselmark; T. James. and j. Miller (2001). Final report: A three-country ICT survey for Rwanda, Tanzania,
and Mozambique. Retreived from http://www.trigrammic.com/downloads/SIDA%20Final%20Project%20Report.pdf on the
21/7/2010

8. Festus Alenkhe; (2016). A security Mirror of the Nigerian Society EBS Tv. Show "Crime Watch":1422.

9. Gary P. B.;A. D. Keinath; P. Hernandez; L. Master; R. Thurston(2009). Element Distribution Modeling] "Biometrics(2007).
Overview" A Primer; (Version 2), Natureserve, Arlington, Virginia, 6268.

10. Hand, D.; H. Mannila; P. Smyth(2001). Principles of Data Mining. MIT Press, Cambridge MA, pp. 525.

11. Jain, A.; L.Hong and S. Pankanti (2000). "Biometric Identification". Communications of the ACM. 43(2): 91-98

12. Jain, A.K.; R. Bolle and S. Pankanti, S. (1999). Biometrics: Personal Identification in

13. Networked Society. Kluwer Academic Publications; 2: 95-98

Impact Factor (JCC):8.8765 NAAS Rating: 3.76

Você também pode gostar